Iranian Journal of Botany最新文献

筛选
英文 中文
Latest trends in the Cybersecurity after the solar wind hacking attack 太阳风黑客攻击后网络安全的最新趋势
Iranian Journal of Botany Pub Date : 2021-03-24 DOI: 10.33897/FUJEAS.V1I2.347
Naveed Akhtar
{"title":"Latest trends in the Cybersecurity after the solar wind hacking attack","authors":"Naveed Akhtar","doi":"10.33897/FUJEAS.V1I2.347","DOIUrl":"https://doi.org/10.33897/FUJEAS.V1I2.347","url":null,"abstract":"That dominance, in any case, has gotten to be a risk. On Sunday, Solar Winds alarmed thousands of its clients that an “outside country state” had found a back entryway into its most well-known item, an instrument called Orion that makes a difference organizations screen blackouts on their computer systems and servers. The company uncovered that programmers snuck a malevolent code that gave them inaccessible get to customers’ systems into an upgrade of Orion. The hack started as early as Walk, Solar Winds conceded, giving the programmers bounty of time to get to the customers’ inside workings. The  breach was not found until the unmistakable cybersecurity company FireEye, which itself employments Solar Winds, decided it had experienced a breach through the program. FireEye has not freely faulted that breach on the Solar Winds hack, but it allegedly affirmed that was the case to the tech location Krebs On Security on Tuesday. FireEye depicted the malware’s bewildering capabilities, from at first lying torpid up to two weeks, to stowed away. That was December 13, 2020. FireEye gauges programmers to begin with picked up get to in Walk 2020. For about eight months, malevolent on-screen characters carted absent untold sums of touchy information from contaminated organizations — and the total scope of the breach is still unfolding. Despite Microsoft seizing the code’s command and control server (a common component in botnet assaults as well), a few security specialists think the assailants may still have get to the Solar Winds Orion program system. Others are conjecturing that these programmers cleared out behind extra, yet-to-be-seen malevolent code.","PeriodicalId":36255,"journal":{"name":"Iranian Journal of Botany","volume":"60 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83960998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Phone numbers classificationwith feed-forward neural networks 前馈神经网络的电话号码分类
Iranian Journal of Botany Pub Date : 2021-03-22 DOI: 10.33897/FUJEAS.V1I2.340
S. Hayat
{"title":"Phone numbers classificationwith feed-forward neural networks","authors":"S. Hayat","doi":"10.33897/FUJEAS.V1I2.340","DOIUrl":"https://doi.org/10.33897/FUJEAS.V1I2.340","url":null,"abstract":"A neural network (NN)-based method for phone number classification or recognition is provided in this paper. The used network is a one-hidden-layer multilayer perceptron (MLP) classifier. Its training is based on backpropagation learning. I present the results of a Feed Forward Neural Network trained to classify phone numbers into four categories: Different training data were pre-processed and then tested to distinguish between four classes/patterns of phone numbers in order to train the FFNN. My goal is to provide a coalescence of the published research in this field and to arouse further research interest in and efforts to research the identified topics.","PeriodicalId":36255,"journal":{"name":"Iranian Journal of Botany","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79794061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive analysis of adaptive image restoration techniques in the presence of different noise models 综合分析了不同噪声模型下的自适应图像恢复技术
Iranian Journal of Botany Pub Date : 2021-03-22 DOI: 10.33897/FUJEAS.V1I2.322
A. Khan
{"title":"A comprehensive analysis of adaptive image restoration techniques in the presence of different noise models","authors":"A. Khan","doi":"10.33897/FUJEAS.V1I2.322","DOIUrl":"https://doi.org/10.33897/FUJEAS.V1I2.322","url":null,"abstract":"Any deprivation caused in the image signal can be thought as a noise. When any image signal is routed through wireless or wired medium it experiences deterioration because of channel characteristics. By knowing the type of noise interfered in the signal, we can use the pertinent filtering techniques to remove the noise from the image. Restoration of the image signal corrupted by noise is very essential for better communication. This paper provides the digital image handling techniques in MATLAB to restore the corrupted image. In this paper, different filtering methods have been discussed in the presence of two separate noise models that distort images. Four different  techniques of filtering, ‘Mean/Average filtering', 'Median filtering', 'Adaptive median filtering' and 'Image Averaging' have been chosen against selected noise models. At the end of the paper we will compare which filtering technique works best for removing a particular noise.","PeriodicalId":36255,"journal":{"name":"Iranian Journal of Botany","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74996566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
تنوع ژنتیکی در میان جوامع گونههای گز با استفاده از نشانگر مولکولی CDDP
Iranian Journal of Botany Pub Date : 2020-12-21 DOI: 10.22092/IJB.2020.342824.1281
محمدعلی قوامپور, سید عباس میرجلیلی, محمد جعفری, حسین آذرنیوند, سید اکبر جوادی
{"title":"تنوع ژنتیکی در میان جوامع گونههای گز با استفاده از نشانگر مولکولی CDDP","authors":"محمدعلی قوامپور, سید عباس میرجلیلی, محمد جعفری, حسین آذرنیوند, سید اکبر جوادی","doi":"10.22092/IJB.2020.342824.1281","DOIUrl":"https://doi.org/10.22092/IJB.2020.342824.1281","url":null,"abstract":"سرده Tamarix به دلیل عدم قطعیت تعداد گونه‌ها، پراکنش و اهمیت اکولوژیکی در ایران، یکی از مهم‌ترین موضوعات در رده‌بندی تیره گز است. در این مطالعه، تنوع ژنتیکی و روابط خانوادگی 34 فرد از 8 جمعیت از 3 گونه Tamarix در استان اصفهان مورد بررسی قرار گرفت. ده آغازگر از نشانگر مولکولی CDDP برای بررسی تنوع ژنتیکی این سرده استفاده شد. 125 باند از ده آغازگر ایجاد شد، که از این تعداد 102 (16/80 درصد) چند شکلی بودند. آنالیز خوشه‌ای جمعیت‌ها را به سه گروه مجزا دسته‌بندی کرد. جریان بالای ژنی در میان گونه‌های Tamarix با استفاده از تجزیه و تحلیل PCoA  تنوع زیادی در بین سه گونه Tamarix نشان داد، به طوری که نمونه‌های گونه‌های مختلف با هم گروه‌بندی شدند. تجزیه واریانس مولکولی نشان داد که تنوع ژنتیکی بین جمعیت (90٪) بیشتر از تنوع ژنتیکی درون جمعیت (10٪) است. بالاترین میانگین تنوع ژنتیکی نای (H) و شاخص تنوع شانون (I) در جمعیت حبیب‌آباد مشاهده شد. تجزیه و تحلیل داده‌ها نشان داد که صفات ریخت‌شناختی و داده‌های توالی DNA  در سرده Tamarix  کاملا با هم ارتباط ندارند، که می‌تواند با وجود تعداد زیاد دورگه‌ بین گونه‌ها و عدم تمایز ژنتیکی بین گونه‌های مورد مطالعه توجیه شود.","PeriodicalId":36255,"journal":{"name":"Iranian Journal of Botany","volume":"26 1","pages":"123-133"},"PeriodicalIF":0.0,"publicationDate":"2020-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87905282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
گزارش جدید گونه Cerastium ponticum Albov برای فلور ایران
Iranian Journal of Botany Pub Date : 2020-12-21 DOI: 10.22092/IJB.2020.343022.1282
Katayoun Poursakhi, Mostafa Assadi, Farrokh Ghahremaninejad
{"title":"گزارش جدید گونه Cerastium ponticum Albov برای فلور ایران","authors":"Katayoun Poursakhi, Mostafa Assadi, Farrokh Ghahremaninejad","doi":"10.22092/IJB.2020.343022.1282","DOIUrl":"https://doi.org/10.22092/IJB.2020.343022.1282","url":null,"abstract":"During a revision of the genus Cerastium L. in Iran, Cerastium ponticum Albov was identified and is reported as a new record from Iran and Flora Iranica area. Morphological characteristics, as well as a full description and distribution of the new record are provided. This taxon is also compared with its close relative species.","PeriodicalId":36255,"journal":{"name":"Iranian Journal of Botany","volume":"1 1","pages":"134-136"},"PeriodicalIF":0.0,"publicationDate":"2020-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83521944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scorzonera alborzensis، گونه جدیدی از زیرجنس Scorzonera و بخشه Nervosae (Asteraceae) از ایران
Iranian Journal of Botany Pub Date : 2020-12-21 DOI: 10.22092/IJB.2020.343548.1290
سیدرضا صفوی, محمد امینی راد
{"title":"Scorzonera alborzensis، گونه جدیدی از زیرجنس Scorzonera و بخشه Nervosae (Asteraceae) از ایران","authors":"سیدرضا صفوی, محمد امینی راد","doi":"10.22092/IJB.2020.343548.1290","DOIUrl":"https://doi.org/10.22092/IJB.2020.343548.1290","url":null,"abstract":"گونه جدیدی از جنس Scorzonera (متعلق به زیرجنس Scorzonera و بخشه Nervosae) به همراه تعدادی تصویر معرفی می‌شود.Scorzonera alborzensis از کوه سیاه‌سنگ در البرز مرکزی جمع‌آوری شده است. این گونه از نظر ریخت‌شناسی نزدیک به Scorzonera cinerea است و با توجه به اندازه و شکل ساقه، اندازه و نحوه پراکندگی برگ‌ها بر روی ساقه، اندازه برگه‌های گریبانی و همچنین اندازه فندقه‌ها از آن متمایز می‌گردد. یک نقاشی و تصویر اسکن شده از نمونه تیپ گونه جدید نیز ارائه شده است.","PeriodicalId":36255,"journal":{"name":"Iranian Journal of Botany","volume":"9 1","pages":"93-99"},"PeriodicalIF":0.0,"publicationDate":"2020-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88382387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Threats on Social Networking Websites 社交网站上的隐私威胁
Iranian Journal of Botany Pub Date : 2020-07-23 DOI: 10.33897/fujeas.v1i1.198
A. Shahid, Umair Abdullah
{"title":"Privacy Threats on Social Networking Websites","authors":"A. Shahid, Umair Abdullah","doi":"10.33897/fujeas.v1i1.198","DOIUrl":"https://doi.org/10.33897/fujeas.v1i1.198","url":null,"abstract":"Abstract: Widespread use of Social networking sites has increased the privacy threat for every individual. Privacy and security problem are two major issues associated with social networks, as the majority of the social network users are not cautious about the usability of the social websites. Social media sites have become latent target regarding offenders because of the occurrence of sensitive information and lack of user awareness of privacy settings. The overall aim of this paper is to enhance awareness about privacy and security issues associated with social networks and to provide guidelines to users for secure usage of social websites. Descriptive research has been conducted as it takes up the majority of online surveying and because of its quantitative nature, it is considered as conclusive. The survey results show that most of the users have their real information on social networking sites and they don’t change privacy settings of their accounts on regular basis. Moreover, as per survey findings, most users accept friend requests and invitations of unknown persons on social networking sites. Results of this research study will be helpful to bring awareness among users about privacy setting and they will learn how to control the privacy settings of their accounts and what type of content should be uploaded on social networking sites.","PeriodicalId":36255,"journal":{"name":"Iranian Journal of Botany","volume":"90 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83910270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Word Embedding Model for Fault Localization using Bug and Software Change Repositories 基于Bug和软件变更库的故障定位词嵌入模型
Iranian Journal of Botany Pub Date : 2020-07-22 DOI: 10.33897/fujeas.v1i1.201
Aqib Rehman
{"title":"A Word Embedding Model for Fault Localization using Bug and Software Change Repositories","authors":"Aqib Rehman","doi":"10.33897/fujeas.v1i1.201","DOIUrl":"https://doi.org/10.33897/fujeas.v1i1.201","url":null,"abstract":"Software developed and then deployed in a real world environment is inevitable to exhibit some undesirable behavior. Therefore, developers need to provide maintenance facilities to enable the bugs causing the undesirable behavior to be fixed. However, prior to fixing the bug, the suspicious part of the code needs to be identified. For this purpose, they usually perform fault localization. This can be done manually as well as automatically. Several techniques exist in the literature for fault localization. However, most of them are static based techniques because they do not depend on a specific programming language along with the possibility to work on underdeveloped software and some other benefits. These techniques are largely based on lexical matching of terms which leads to mismatch of terms, large precision value because of limited vocabulary of a programming language and some techniques consider the semantics but it is computationally expensive to localize faults through this. In this paper we have proposed a fault localization technique which is based on the machine learning concept of word embedding. Our proposed approach aims at looking at the relatedness between the bug terms and source code artifact. We mined the bug repositories and software change repositories to train the word embedding model on the mined repositories data. On the arrival of a new bug, the cluster of the bugs from the model is searched and the files from the software change repositories are retrieved which are used for fixing those bugs. We have compared the results of our approach with the latest technique proposed in year 2018 Pointwise Mutual Information (PMI) and Normalized Google Distance (NGD) which consider the context and also with existing lexical techniques Vector Space Model (VSM) and the semantic based method Latent Semantic Indexing (LSI). We have used the benchmark dataset “MoreBugs” which has been widely used in this domain. The results show that our approach outperforms other techniques.","PeriodicalId":36255,"journal":{"name":"Iranian Journal of Botany","volume":"120 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90581755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying Centrality Measures for Impact Analysis in Coauthor ship Network 中心性测度在合作船舶网络影响分析中的应用
Iranian Journal of Botany Pub Date : 2020-07-22 DOI: 10.33897/fujeas.v1i1.200
Adeel Ahmed, Riqza Shabbir, Atifa Afzal, Muhammad Akmal, Sahar Fatimah
{"title":"Applying Centrality Measures for Impact Analysis in Coauthor ship Network","authors":"Adeel Ahmed, Riqza Shabbir, Atifa Afzal, Muhammad Akmal, Sahar Fatimah","doi":"10.33897/fujeas.v1i1.200","DOIUrl":"https://doi.org/10.33897/fujeas.v1i1.200","url":null,"abstract":"Nowadays social networking is an essential part of everyone’s life to communicate with different people around the globe. Due to improvement in expertise networks are growing rapidly and becoming more complex. Through social networking, we can identify different communities that help us to get information about different people and their work in different fields. In social networks, community detection is one of the hot areas. In this paper, we have analyzed a co-authorship network of political science and ranked the authors on the basis of common centrality measures. Finding reveals that these common centrality measures can be useful indicators for impact analysis.","PeriodicalId":36255,"journal":{"name":"Iranian Journal of Botany","volume":"157 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79941352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Assessing Research Collaboration in Database Systems and Computer Networks by Analysis of Coauthorship Network 从合作网络的分析评估数据库系统和计算机网络中的研究合作
Iranian Journal of Botany Pub Date : 2020-07-22 DOI: 10.33897/fujeas.v1i1.199
Adeel Ahmed, Tanveer Ahmed
{"title":"Assessing Research Collaboration in Database Systems and Computer Networks by Analysis of Coauthorship Network","authors":"Adeel Ahmed, Tanveer Ahmed","doi":"10.33897/fujeas.v1i1.199","DOIUrl":"https://doi.org/10.33897/fujeas.v1i1.199","url":null,"abstract":"Community detection is a fundamental problem in social networks. These networks detect communities based on link analysis and strong connection strengths, but cannot reflect Author’s from different research areas. To address the problem of community detection, we have done a study for “Analyzing patterns of collaboration in co-authorship network using Modularity and Centrality Measures”. This analysis study uses combine features of Modularity with centrality measure to effectively detect community of different author’s having different research collaboration with different interests in domain of Computer Networks and Database Systems. Experiment of Dataset shown that this approach is better detect best authors from specific domain having high collaboration with other coauthors and presents information to the researcher’s that have relative interest in relative author’s community.","PeriodicalId":36255,"journal":{"name":"Iranian Journal of Botany","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80695756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信